Third-Party Audit by Digilol [PDF Report]
XMR Node
yskshhzpgvv75jxapyr3htmnvsnqe37soyemdibyegw55cglnh2j6qyd.onion:18089
tkgoeuwv5a56faumxssuj6ohhvop4subxwhxhg5kfstrzozvmqwa.b32.i2p:18089
Node Stats: [Clearnet] / [Tor]
Pruned node — syncing in progress. Restricted RPC. No login required.
DNS Resolver
Self-hosted recursive resolver — no logs, no filtering, DNSSEC.
DNS-over-HTTPS (DoH)
https://dns.captaincanarynode.org/dns-query
DoHoT — Tor hidden service
http://lczd7vkeb3i4ifxtoccxaik45o4wisyz3ch2jb2zr6yrpcqz4csiukid.onion/dns-query
dnscrypt-proxy stamp (DoH via Tor)
sdns://AgMAAAAAAAAAAAAZZG5zLmNhcHRhaW5jYW5hcnlub2RlLm9yZwovZG5zLXF1ZXJ5
Public resolver IPv4
103.245.231.60
Authoritative nameservers
dns.captaincanarynode.org / dns2.captaincanarynode.org
How it works
DNS translates hostnames into IP addresses. Every connection starts with a DNS query. By default these are sent in plaintext to your ISP — who can log every site you visit even over HTTPS.
DoH (DNS-over-HTTPS) encrypts queries inside HTTPS, blocking ISP-level snooping. Trust shifts from your ISP to the resolver operator.
DoHoT (DNS-over-HTTPS-over-Tor) routes encrypted queries through Tor first. The resolver only sees a Tor exit node — not your IP. No single party holds both your identity and query history.
Stack: nginx SNI → dnsdist 1.9 (TLS/HTTP2) → unbound (recursive, no logs)
Setup
Firefox
Settings → Privacy & Security → DNS over HTTPS → Custom → paste DoH URL above.
Chrome / Chromium
Settings → Security → Use secure DNS → Custom → paste DoH URL above.
Android (Private DNS)
dns.captaincanarynode.org
Linux — dnscrypt-proxy + Tor
proxy = 'socks5://127.0.0.1:9050'
[static]
[static.captain-canary]
stamp = 'sdns://AgMAAAAAAAAAAAAZZG5zLmNhcHRhaW5jYW5hcnlub2RlLm9yZwovZG5zLXF1ZXJ5'
Linux — systemd-resolved
# /etc/systemd/resolved.conf.d/doh.conf [Resolve] DNS=https://dns.captaincanarynode.org/dns-query FallbackDNS=
VPN Setup
Privacy VPNs accepting Monero. Set custom DNS to use this resolver inside the tunnel.
iVPN — CLI
ivpn dns -doh https://dns.captaincanarynode.org/dns-query 103.245.231.60
GUI: Settings → DNS → DNS over HTTPS → Custom
Mullvad — CLI
mullvad dns set custom 103.245.231.60
GUI: Settings → VPN Settings → Custom DNS → enable → enter IP
AirVPN (Eddie)
Preferences → DNS → Override DNS → Custom → 103.245.231.60
OVPN
Settings → DNS Servers → Custom → 103.245.231.60
WireGuard — any provider
[Interface] DNS = 103.245.231.60
OpenVPN — any provider
dhcp-option DNS 103.245.231.60